A Review on Hybrid Fingerprinting on Internet Traffic

نویسندگان

  • Amit kumar Sahu
  • Chinmay Bhatt
  • Shrikant Lade
چکیده

Countless have been proposed on intrusion detection system, which prompts the execution of executor based intelligent IDS (IIDS), Non – intelligent IDS (NIDS), signature based IDS and so on. While building such IDS models, taking in calculations from stream of system movement assume essential part in precision of IDS frameworks. The proposed work concentrates on actualizing the novel strategy to group system activity which wipes out the restrictions in existing internet grouping calculations and demonstrates the heartiness and correctness over expansive stream of system movement touching base at to a great degree high rate. We contrast the current calculation and novel routines to examine the correctness and unpredictability. Keywords— Fingerprinting, Data Stream Mining, Clustering algorithm

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fingerprintability of WebRTC

We examine WebRTC’s suitability as a means of Internet censorship circumvention. WebRTC is a framework and suite of protocols for peer-to-peer communication between web browsers. We analyze the implementation differences in instantiations of WebRTC that make it possible to “fingerprint” implementations—potentially distinguishing circumvention-related uses from ordinary ones. This question is re...

متن کامل

Video fingerprinting for copy identification: from research to industry applications

Research that began a decade ago in video copy detection has developed into a technology known as “video fingerprinting”. Today, video fingerprinting is an essential and enabling tool adopted by the industry for video content identification and management in online video distribution. This paper provides a comprehensive review of video fingerprinting technology and its applications in identifyi...

متن کامل

IEEE 802.11 user fingerprinting and its applications for intrusion detection

Easy associations with wireless access points (APs) give users temporal and quick access to the Internet. It needs only a few seconds to take their machines to hotspots and do a little configuration in order to have Internet access. However, this portability becomes a double-edged sword for ignorant network users. Network protocol analyzers are typically developed for network performance analys...

متن کامل

A statistical approach to classify Skype traffic

Abstract- Skype is one of the most powerful and high-quality chat tools that allows its users to use of many services such as: transferring audio, sending messages, video conferencing and audio for free. Skype traffic has a lot of Internet traffic. Hence, Internet service providers need to identify traffic to do the quality of service and network management. On the other hand, Skype developers ...

متن کامل

Deep Learning Website Fingerprinting Features

Anonymity networks like Tor enable Internet users to browse the web anonymously. This helps citizens circumvent censorship from repressive governments, journalists communicate with anonymous sources or regular users to avoid tracking online. However, adversaries can try to identify anonymous users by deploying several attacks. One of such attacks is website fingerprinting. Website fingerprintin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014